Existing methods of identification are not perfect, because to pass the test, you have to share data with a certain number of counterparties, and the more such counterparties with data on a person, the easier it is to identify it. But this organization of the issue eventually creates a network in which each node – the counterparty – is a potentially vulnerable link. Sometimes it even happens that the counterparty has to transfer information about a person to third parties, and then this network grows exponentially. In general, there is a breach of security measures. But we all want the data about us and our operations to be transferred to someone, then they were reliably preserved.
The IAME platform will help to solve this problem. IAME is a decentralized identification system that allows the parties to blocking transactions to check on the initial level the identity of each other without disclosing to the counterparty the unimportant confidential information, and at the secondary level the origin of the crypto currency in the transaction. How is this achieved? Identification will be carried out by a set of independent third-party validators, each of which will check its fragments of information, and only together they can form the result of a complete verification. The result of the check will be written to the designated block account and will become public in the repository, from which you can learn about the status of the transaction and about the currency, while the user data will remain hidden.
The basis of the platform identification network will consist of the following elements:
- distribution server
- verification server
- blockage with identification result from all validators
- identification server
Here’s how the validation process itself will work:
And so – identification:
The main application of the platform is the simplification of P2P blocking transactions, for example, transactions of online traders. Let’s say that there is a transaction between the seller and the buyer using the crypto currency. Insubstantial information that can be transferred in such a transaction is an identity document, any receipts and so on. In this case, in fact, only the name and payment details for payment (address purse).
When IAME is used, a process will be performed to check all the information provided by the user for compliance with the unit and whether it was guaranteed by the identification network.
The platform provides a mechanism for rewarding validators. For this mechanism, two methods have been developed: token remuneration and node ranking system:
1. Token remuneration system distributes the IAM-token pool to third-party validators upon completion of the fragmented validation process (by analogy with the mining process)
2. The ranking system. In a nutshell: validators with a higher rating get more tokens, which indicates their ratings.
In principle, the determination of the distribution of any pool of IAM tokens will depend on the results of the work of the Tribunal, while the ranking system will function according to the results of the Appeal and the Control Tribunal. By using a double blind procedure, third-party validators will never know whether they are in the Tribunal, the Appeal or the Control Tribunal, which reduces the risk of cheating the system even more. Third-party verification will be publicly available, and in the long run, third-party validators with insufficient ratings will be prohibited from acting as a node.
A few words about the token:
To manage the platform, an IAM token will be issued that acts as a verification token to initiate confirmation requests for validation packets in the IAME Identity Network. The parties will spend the token through a special client, and after deduction equal to the cost of hashing of the block, the number of tokens will be paid as a reward to third-party validators.
The dates for the beginning of the ICO project have not yet been determined, it is known that the minimum goal of fees is $ 1 million, and the maximum is $ 25 million
In conclusion, I would like to say that the project is quite interesting and technological, and it solves really complex problems in such an important area as security. We wish the project team success!
For more information: